Close Menu
WashingtonExec
    Podcast Episodes
    LinkedIn Facebook X (Twitter) Instagram YouTube
    LinkedIn Facebook X (Twitter) Instagram YouTube
    WashingtonExec
    Subscribe To The Daily
    • News & Headlines
    • Executive Councils
    • Videos
    • Podcast
    • Events
      • 🏆 Chief Officer Awards
      • 🏆 Pinnacle Awards
    • About
    • Contact Us
    LinkedIn YouTube X (Twitter)
    WashingtonExec
    You are at:Home»Execs to Know»Internet of Things Could Make Everyone Both ‘Unwitting Predator and Unsuspecting Prey’
    Execs to Know

    Internet of Things Could Make Everyone Both ‘Unwitting Predator and Unsuspecting Prey’

    By WashingtonExec Staff WriterNovember 7, 2017
    Share
    LinkedIn Facebook Twitter Email
    William Evanina, director of the National Counterintelligence and Security Center

    The connected ecosystem of smart devices has become a fertile ground for hackers, and both government and industry should think of new, better ways to protect themselves, according to the federal government’s head of national counterintelligence.

    In a commentary on FederalNewsRadio,com Director of the National Counterintelligence and Security Center William Evanina highlighted the current cyberthreats Americans face. He credits IoT and other technological advancements to creating and enhancing vulnerabilities in every facet of Americans’ daily lives.

    “Our homes are no longer private spaces,” he wrote. “Manufacturers are now discontinuing production of electronic devices that lack integrated smart technology, and some are preventing us from disabling the smart technology within smart devices. And IoT features are appearing in unexpected places, such as light bulbs.”

    Evanina spent considerable time analyzing and addressing the evolving threats to U.S. national and economic security. His advice on the subject is that “we must use all available tools and safe practices to avoid identity theft or financial loss.”

    As these threats become more common, the U.S. should consider new ways of fighting them. One solution is a “hack back” approach, where private companies employ offensive countermeasures against cyber crooks. Other solutions include creating safeguards and providing cyber counteroffensive lessons.

    “Every American citizen, government agency and commercial or private business that has internet-connected devices and networks is a target, and can become both an unwitting predator and unsuspecting prey,” Evanina wrote.

    To read more, click here.

     

    Previous ArticleSevatec Hires Angela Butler To Expand Civilian Agency Business
    Next Article AT&T Shifts Roles for Mike Leff, Chris Smith

    Related Posts

    WATCH: The Future of Government Service is Human-Centered, Data-Driven, AI-Enabled & Securely Connected

    Noblis MSD Wins $45M Navy Contract for Engineering, Cyber Support

    SPA Names Mark Adams Chief Capability Officer as Workforce & Tech Investments Grow

    Comments are closed.

    LinkedIn Follow Button
    LinkedIn Logo Follow Us on LinkedIn
    Latest Industry Leaders

    Top CFOs to Watch in 2025

    Top HR Execs to Watch in 2025

    Load More
    Latest Posts

    WATCH: The Future of Government Service is Human-Centered, Data-Driven, AI-Enabled & Securely Connected

    December 8, 2025

    Noblis MSD Wins $45M Navy Contract for Engineering, Cyber Support

    December 8, 2025

    SPA Names Mark Adams Chief Capability Officer as Workforce & Tech Investments Grow

    December 8, 2025

    Top CIOs to Watch in 2026: Maximus’ Derrick Pledger

    December 8, 2025

    REI Systems Wins Follow-on Contract to Expand NSF’s Proposal Evaluation System

    December 8, 2025
    Quick Links
    • Executive Councils & Committees
    • Chief Officer Awards
    • Pinnacle Awards
    • Advertise With Us
    • About WashingtonExec
    • Contact
    Connect
    • LinkedIn
    • YouTube
    • Facebook
    • Twitter

    Subscribe to The Daily

    Connect. Inform. Celebrate.

    Copyright © WashingtonExec, Inc. | All Rights Reserved. Powered by JMG

    Type above and press Enter to search. Press Esc to cancel.